{"id":382,"date":"2008-07-21T21:29:31","date_gmt":"2008-07-22T01:29:31","guid":{"rendered":"https:\/\/dandunn.org\/blog\/?p=382"},"modified":"2008-07-23T14:45:31","modified_gmt":"2008-07-23T18:45:31","slug":"your-laptop-data-security","status":"publish","type":"post","link":"https:\/\/dandunn.org\/blog\/2008\/07\/your-laptop-data-security\/","title":{"rendered":"Your Laptop Data Security"},"content":{"rendered":"<p>A few months ago I scanned some news article that talked about the vulnerability of reading memory chips even after the computer has been turned off.  I thought it was an interesting idea, but didn&#8217;t look at it deeper.<\/p>\n<p>Then I saw this YouTube video from <a title=\"CITP\" href=\"http:\/\/citp.princeton.edu\/memory\/\">CITP at Princeton<\/a>.  You don&#8217;t have to be a crypto-geek or a math major to understand this; the video explains it in plain English.<\/p>\n<p>You know that when you turn your computer off, the RAM (memory) is wiped, right?  Think again.<\/p>\n<p><object classid=\"clsid:d27cdb6e-ae6d-11cf-96b8-444553540000\" width=\"425\" height=\"344\" codebase=\"http:\/\/download.macromedia.com\/pub\/shockwave\/cabs\/flash\/swflash.cab#version=6,0,40,0\"><param name=\"wmode\" value=\"transparent\" \/><param name=\"src\" value=\"http:\/\/www.youtube.com\/v\/JDaicPIgn9U\" \/><embed type=\"application\/x-shockwave-flash\" width=\"425\" height=\"344\" src=\"http:\/\/www.youtube.com\/v\/JDaicPIgn9U\" wmode=\"transparent\"><\/embed><\/object><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few months ago I scanned some news article that talked about the vulnerability of reading memory chips even after the computer has been turned off. I thought it was an interesting idea, but didn&#8217;t look at it deeper. Then I saw this YouTube video from CITP at Princeton. You don&#8217;t have to be a [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"class_list":["post-382","post","type-post","status-publish","format-standard","hentry","category-technology"],"_links":{"self":[{"href":"https:\/\/dandunn.org\/blog\/wp-json\/wp\/v2\/posts\/382","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dandunn.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dandunn.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dandunn.org\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dandunn.org\/blog\/wp-json\/wp\/v2\/comments?post=382"}],"version-history":[{"count":0,"href":"https:\/\/dandunn.org\/blog\/wp-json\/wp\/v2\/posts\/382\/revisions"}],"wp:attachment":[{"href":"https:\/\/dandunn.org\/blog\/wp-json\/wp\/v2\/media?parent=382"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dandunn.org\/blog\/wp-json\/wp\/v2\/categories?post=382"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dandunn.org\/blog\/wp-json\/wp\/v2\/tags?post=382"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}